CVE-2007-5323
 
Severity Score
10.0
*CVSS v2
Exploit Likelihood
*EPSS
Affected Versions
*CPE
Public Exploits
0
*Multiple Sources
Exploited in Wild
-
*KEV
Decision
-
*SSVC
Descriptions
The RepliStor Server Service in EMC Replistor 6.1.3 allows remote attackers to execute arbitrary code via a size value that causes RepliStor to create a smaller buffer than expected, which triggers a buffer overflow when that buffer is used in a recv function call.
El servicio RepliStor Server de EMC REplistor 6.1.3 permite a atacantes remotos ejecutar código de su elección mediante un valor de tamaño (size) que hace que RepliStor cree un búfer más pequeño de lo esperado, lo cual dispara un desbordamiento de búfer cuando ese búfer se usa en una llamada a la función recv.
*Credits:
N/A
CVSS Scores
Attack Vector
Attack Complexity
Authentication
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:-
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2007-10-10 CVE Reserved
- 2007-10-11 CVE Published
- 2024-07-07 EPSS Updated
- 2024-08-07 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CAPEC
References (6)
URL | Tag | Source |
---|---|---|
http://dvlabs.tippingpoint.com/advisory/TPTI-07-18 | X_refsource_misc | |
http://secunia.com/advisories/27166 | Third Party Advisory | |
http://www.securityfocus.com/bid/26014 | Vdb Entry | |
http://www.securitytracker.com/id?1018799 | Vdb Entry | |
http://www.vupen.com/english/advisories/2007/3458 | Vdb Entry | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/37075 | Vdb Entry |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|